Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.94.197.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.94.197.109.			IN	A

;; AUTHORITY SECTION:
.			336	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032700 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 23:18:25 CST 2020
;; MSG SIZE  rcvd: 118
Host info
109.197.94.145.in-addr.arpa domain name pointer wlan-145-94-197-109.wlan.tudelft.nl.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
109.197.94.145.in-addr.arpa	name = wlan-145-94-197-109.wlan.tudelft.nl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
178.62.251.11 attack
Jul  5 21:08:27 dedicated sshd[28772]: Invalid user mian from 178.62.251.11 port 58256
2019-07-06 04:54:01
200.187.178.134 attackspambots
Jul  4 15:36:03 mail sshd[16269]: Invalid user joan from 200.187.178.134
Jul  4 15:36:03 mail sshd[16269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.178.134
Jul  4 15:36:03 mail sshd[16269]: Invalid user joan from 200.187.178.134
Jul  4 15:36:05 mail sshd[16269]: Failed password for invalid user joan from 200.187.178.134 port 36746 ssh2
Jul  4 15:40:53 mail sshd[17031]: Invalid user asmund from 200.187.178.134
...
2019-07-06 05:30:24
47.244.60.162 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-07-06 05:09:34
41.202.219.73 attackbots
Automatic report - Web App Attack
2019-07-06 05:21:52
200.71.67.48 attack
Brute force attempt
2019-07-06 05:26:10
104.198.208.91 attackspambots
MLV GET /wordpress/
GET /wp/
2019-07-06 05:23:15
196.52.43.88 attack
05.07.2019 19:23:42 Connection to port 502 blocked by firewall
2019-07-06 04:50:05
186.103.197.99 attack
Unauthorised access (Jul  5) SRC=186.103.197.99 LEN=40 TTL=236 ID=24965 TCP DPT=445 WINDOW=1024 SYN
2019-07-06 05:21:01
180.232.96.162 attack
2019-07-05T20:58:43.250488abusebot-3.cloudsearch.cf sshd\[9131\]: Invalid user nagios from 180.232.96.162 port 36066
2019-07-06 05:07:40
36.82.105.8 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:10:10,448 INFO [shellcode_manager] (36.82.105.8FO [shellcode_manager] (94.28.54.6) no match, writing hexdump (e2538cfdfc31a413c7745aa8c1000ff6 :2824213) - MS17010 (EternalBlue)
2019-07-06 05:13:04
82.118.134.58 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:13:36,915 INFO [shellcode_manager] (82.118.134.58) no match, writing hexdump (9e01b0d2e36a5dfc742020677f98eb57 :2416538) - MS17010 (EternalBlue)
2019-07-06 05:03:53
91.134.227.180 attackspambots
Invalid user marek from 91.134.227.180 port 50668
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.227.180
Failed password for invalid user marek from 91.134.227.180 port 50668 ssh2
Invalid user update from 91.134.227.180 port 48826
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.227.180
2019-07-06 05:09:15
218.92.0.185 attackspam
Jul  5 14:14:08 TORMINT sshd\[17958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.185  user=root
Jul  5 14:14:10 TORMINT sshd\[17958\]: Failed password for root from 218.92.0.185 port 11147 ssh2
Jul  5 14:14:28 TORMINT sshd\[17977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.185  user=root
...
2019-07-06 04:58:51
118.179.252.81 attack
Jul  5 19:45:20 server3 sshd[701514]: reveeclipse mapping checking getaddrinfo for 118-179-252-81.dsl.mls.nc [118.179.252.81] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul  5 19:45:20 server3 sshd[701514]: Invalid user admin from 118.179.252.81
Jul  5 19:45:20 server3 sshd[701514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.179.252.81
Jul  5 19:45:22 server3 sshd[701514]: Failed password for invalid user admin from 118.179.252.81 port 51159 ssh2
Jul  5 19:45:24 server3 sshd[701514]: Connection closed by 118.179.252.81 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.179.252.81
2019-07-06 05:05:52
201.63.28.114 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:13:52,250 INFO [shellcode_manager] (201.63.28.114) no match, writing hexdump (8999b2ca63e54d729df01b3a57f4e624 :2394914) - MS17010 (EternalBlue)
2019-07-06 04:53:35

Recently Reported IPs

213.180.142.217 136.232.16.194 77.47.165.98 65.94.175.79
47.93.159.143 162.255.119.105 201.236.150.141 125.69.76.138
175.106.10.66 196.27.0.9 192.185.94.121 249.193.152.60
104.149.156.114 234.41.202.87 28.161.85.92 7.24.222.121
71.158.112.239 67.20.76.238 122.223.88.79 32.65.70.197